Multiple Choice
The use of the smart card or security tokens is referred to as a two factor authorization because:
A) It is based on something the user has, the token or card, and something the user knows, the password.
B) It requires that the user is granted the card / token in a secure environment and that the user actually uses the card / token.
C) It requires that the user has two different authorizations: (1) to receive the card / token, and (2) to use the card / token.
D) It requires the use the card / token to (1) login to the system and (2) access the applications.
Correct Answer:

Verified
Correct Answer:
Verified
Q98: Which control total is the total of
Q99: The functional responsibilities within an IT system
Q100: Which of the following items is not
Q101: The paper form used to capture and
Q102: This type of input validation check assesses
Q103: The establishment of log-in procedures can help
Q104: This term means that a user cannot
Q105: This form of encryption uses a public
Q107: This security feature, used on wireless networks,
Q108: A company has the following invoices